CN110371081A - Vehicle tamper resistant method, device and vehicle - Google Patents
Vehicle tamper resistant method, device and vehicle Download PDFInfo
- Publication number
- CN110371081A CN110371081A CN201910729772.1A CN201910729772A CN110371081A CN 110371081 A CN110371081 A CN 110371081A CN 201910729772 A CN201910729772 A CN 201910729772A CN 110371081 A CN110371081 A CN 110371081A
- Authority
- CN
- China
- Prior art keywords
- vehicle
- cryptographic hash
- premise equipment
- server
- judging result
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R25/00—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
- B60R25/20—Means to switch the anti-theft system on or off
- B60R25/2018—Central base unlocks or authorises unlocking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
Abstract
The present invention provides vehicle tamper resistant method, comprising: the identity information of the premise equipment of the vehicle of collection is carried out Hash calculation and obtains the first cryptographic Hash;The second cryptographic Hash that server is sent is received, second cryptographic Hash carries out identical Hash calculation by the identity information of the legal premise equipment of the vehicle and obtains;Judge whether first cryptographic Hash and second cryptographic Hash being stored in advance on the server are identical, obtains the first judging result;Corresponding first control strategy is executed according to first judging result.The present invention also provides a kind of vehicle tamper resistant device and vehicles.The present invention can prevent vehicle key equipment to be tampered, and improve vehicle safety.
Description
Technical field
The present invention relates to technical field of vehicle more particularly to a kind of vehicle tamper resistant methods, device and vehicle.
Background technique
It should be noted that it is all the prior art that content documented by this part, which does not represent,.
Be generally fitted with vehicle arrangement on vehicle, for example, BCM controller, Engine ECU, electric vehicle VCU, BMS controller,
Domain controller, intelligent gateway etc., to realize that vehicle various aspects operate normally.Some vehicle arrangements are concerning in the normal row of vehicle
Sail, therefore security requirement is very high, for example, the safeties such as electric vehicle VCU and Engine ECU just may require that it is very high, if car owner
It voluntarily distorts, is then easy to cause safety accident, cause casualties.
Summary of the invention
In consideration of it, one of the technical issues of in order to solve in the related technology to a certain extent, it is necessary to provide a kind of vehicle
Tamper resistant method, device and vehicle, prevent vehicle key equipment to be tampered, and improve vehicle safety.
First aspect present invention provides a kind of vehicle tamper resistant method, the described method comprises the following steps:
The identity information of the premise equipment of the vehicle of collection is subjected to Hash calculation and obtains the first cryptographic Hash;
The second cryptographic Hash that server is sent is received, second cryptographic Hash passes through the legal premise equipment of the vehicle
Identity information carries out identical Hash calculation and obtains;
Judge whether first cryptographic Hash and the second cryptographic Hash being stored in advance on the server are identical, obtains the
One judging result;
Corresponding first control strategy is executed according to first judging result.
Further, including at least two premise equipments, the identity of the premise equipment of the vehicle by collection are believed
Breath carries out Hash calculation and obtains the first cryptographic Hash, comprising:
Hash calculation is carried out after combining the identity information of at least two premise equipment according to predetermined way obtains the
One cryptographic Hash.
Further, the identity information includes: the device id of the premise equipment and the chip of the premise equipment
ID;
The mode of the predetermined way combination includes: to make a reservation for set using the device id and chip id combination as described
Standby total ID, and the input value by total ID combination of each premise equipment as Hash calculation in order.
It is further, described that corresponding first control strategy is executed according to first judging result, comprising:
When first cryptographic Hash and second cryptographic Hash are unequal, the determining premise equipment being tampered is simultaneously right
The premise equipment being tampered executes corresponding control strategy.
Further, described that corresponding first control strategy is executed according to first judging result, comprising: when described the
One judging result is when being, to allow logon operation;
After corresponding first control strategy according to first judging result execution, the method also includes:
Corresponding MD5 value is generated according to the software version information of the premise equipment;
It receives the corresponding with legal software version of server transmission and prestores MD5 value;
Judge the MD5 value and whether prestore MD5 value identical, and obtains the second judging result;
Corresponding second control strategy is executed according to second judging result.
Second aspect of the present invention provides a kind of vehicle tamper resistant method, the described method comprises the following steps:
The identity information of the premise equipment of the vehicle of collection is subjected to Hash calculation and obtains the first cryptographic Hash;
First cryptographic Hash is sent to server, with by the server judge first cryptographic Hash and in advance
Whether the second cryptographic Hash being stored on the server is identical, and second cryptographic Hash makes a reservation for set by the legal of the vehicle
Standby identity information carries out identical Hash calculation and obtains;
Corresponding first control strategy is executed according to the first judging result of the server feedback.
It is further, described that corresponding first control strategy is executed according to the first judging result of the server feedback,
It include: to allow logon operation when the first judging result of the server feedback, which is, is;
After corresponding first control strategy according to first judging result execution, the method also includes:
Corresponding MD5 value is generated according to the software version information of the premise equipment;
The MD5 value is sent to the server, to judge the MD5 value by the server and be stored in advance in
On the server whether prestore MD5 value identical;
Corresponding second control strategy is executed according to the second judging result of the server feedback.
Third aspect present invention provides a kind of vehicle tamper resistant device, and described device includes:
Computing module obtains first for the identity information of the premise equipment for the vehicle collected to be carried out Hash calculation
Cryptographic Hash;
Receiving module, for receiving the second cryptographic Hash of server transmission, second cryptographic Hash passes through the vehicle
The identity information of legal premise equipment carries out identical Hash calculation and obtains;
Judgment module, for judging that first cryptographic Hash is with the second cryptographic Hash being stored in advance on the server
It is no identical, obtain the first judging result;
Execution module, for executing corresponding first control strategy according to first judging result.
Fourth aspect present invention provides a kind of vehicle tamper resistant device, and described device includes:
Computing module obtains first for the identity information of the premise equipment for the vehicle collected to be carried out Hash calculation
Cryptographic Hash;
Sending module, for first cryptographic Hash to be sent to server, to judge described the by the server
Whether one cryptographic Hash and the second cryptographic Hash being stored in advance on the server are identical, and second cryptographic Hash passes through the vehicle
The identity information of legal premise equipment carry out identical Hash calculation and obtain;
Execution module, for executing corresponding first control strategy according to the first judging result of the server feedback.
Fifth aspect present invention provides a kind of vehicle, and the vehicle includes:
Processor;And
Storage device, the storage device include processor-executable instruction, and the executable instruction is held by processor
For executing the vehicle tamper resistant method when row.
By above scheme it is found that the identity information of premise equipment is carried out Hash calculation by the present invention, as long as legal is pre-
Locking equipment is not distorted, then its identity information is constant, then the cryptographic Hash after Hash calculation is and storage on the server legal pre-
The cryptographic Hash of locking equipment be it is identical, when legal premise equipment is replaced, then its identity information changes, then Hash calculation
Cryptographic Hash afterwards be change, it is therefore, not identical as the cryptographic Hash for the legal premise equipment for being stored in advance in server, by with
Upper judging result, vehicle executes corresponding control strategy, so as to improve the safety of automobile.
Detailed description of the invention
Fig. 1 is the structural schematic diagram of the vehicle tamper resistant method of the first embodiment of the present invention.
Fig. 2 is the structural schematic diagram of the vehicle tamper resistant method of the second embodiment of the present invention.
Fig. 3 is the structural schematic diagram of the vehicle tamper resistant method of the third embodiment of the present invention.
Fig. 4 is the structural schematic diagram of the vehicle tamper resistant method of the fourth embodiment of the present invention.
Fig. 5 is the structural schematic diagram of the vehicle of one embodiment of the present invention.
Fig. 6 is the structural schematic diagram of the vehicle tamper resistant device of the first embodiment of the present invention.
Fig. 7 is the structural schematic diagram of the vehicle tamper resistant device of the second embodiment of the present invention.
The present invention that the following detailed description will be further explained with reference to the above drawings.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
The embodiment of the present invention, those of ordinary skill in the art's obtained every other reality without making creative work
Example is applied, protection scope of the present invention is belonged to.It is understood that attached drawing be provided solely for reference and description use, not be used to pair
The present invention limits.
Fig. 1 is the vehicle tamper resistant method that first embodiment of the invention provides, and is applied to vehicle, the method may include
Following steps.
S100: the identity information of the premise equipment of the vehicle of collection is subjected to Hash calculation and obtains the first cryptographic Hash.
It should be understood that the vehicle can be electric vehicle, gasoline car or mixed electrical automobile herein with no restrictions can
To be that car is also possible to in-between car, herein also with no restrictions.
The premise equipment can be manufacturer and set, the high vehicle arrangement of security requirement according to the needs of safety
It can be set as premise equipment, can be using one or some very crucial vehicle arrangements are as premise equipment, premise equipment is
It is not intended to user or other people are distorted with private strength and selected vehicle arrangement, such as can be BCM controller, start
Machine ECU, electric vehicle VCU, BMS controller, domain controller, intelligent gateway etc. can also include that other are not desired to be tampered certainly
Other equipment etc..
It in the present embodiment, may include at least two premise equipments, it can all by two different vehicle arrangements
It is set as premise equipment.Therefore, this step can specifically include: by the identity information of at least two premise equipment according to pre-
Determine progress Hash calculation after mode combines and obtains the first cryptographic Hash.Can by premise equipment security level from high to low in the way of
Corresponding arrangement identity information, can also by premise equipment security level from low to high in the way of accordingly arrange identity information,
It can be combined according to other scheduled modes, the safety of such Hash calculation can be higher.
Manufacturer can be each regular premise equipment (including being installed on vehicle when factory and not being installed on vehicle
On but can be installed on vehicle) the individual identity information of distribution, the identity information may include the ID of premise equipment
And the chip id (such as main control chip ID) of premise equipment, etc..
It after vehicle release, is generally controlled by car owner, on startup, vehicle can pass through intelligent gateway/domain controller to vehicle
The identity information of the premise equipment of vehicle described in active collection.The identity information can obtain the first Hash by Hash calculation
Value, the first cryptographic Hash is a string of characters, such as is calculated the first cryptographic Hash by SHA256, the first cryptographic Hash we can claim
For the automobile finger-print that obtains in real time.
In the present embodiment, the mode of the predetermined way combination may include: with the device id and the chip
ID combines total ID (such as device id+chip id) as the premise equipment, and in order by each premise equipment
The input value of total ID combination (such as the total IDn of the total ID2..+ of total ID1+) as Hash calculation, through Hash calculation (such as SHA256
(the total IDn of total total ID2..+ of ID1+)) obtain the first cryptographic Hash.
It may be adapted after vehicle release, exterior trim, interior trim and premise equipment including vehicle etc., car owner's replacement is predetermined to be set
(car owner is likely to be the premise equipment with identity information bought from the regular channel in market, it is also possible to be from market after standby
Informal channel purchase the premise equipment without identity information), identity information will change, thus after Hash calculation
Obtained cryptographic Hash also changes correspondingly.
S110: receiving the second cryptographic Hash that server is sent, and second cryptographic Hash passes through the legal predetermined of the vehicle
The identity information of equipment carries out identical Hash calculation and obtains.
Before factory, the premise equipment being installed on vehicle has unique identity information for manufacturer, has installed before factory
It is referred to as legal premise equipment, i.e. equipment not tampered by user in the premise equipment on vehicle.Before factory, these are predetermined
The identity information of equipment can be recorded by manufacturer and collect and store, and the identity information of legal premise equipment passes through Hash calculation
The second cryptographic Hash is obtained, the second cryptographic Hash stores in the server, and Hash calculation mode is identical as aforesaid way, with the first Hash
It is worth identical, the second cryptographic Hash is also a string of characters, and character quantity is equal.Since the identity information of the premise equipment of each car is
Uniquely, therefore, corresponding second cryptographic Hash of each car is also unique.Second cryptographic Hash we can be referred to as legal automobile
Fingerprint.
After vehicle launch, vehicle can after server receives the request to the second cryptographic Hash of server request
To authenticate to the request, the second cryptographic Hash can be sent to the vehicle if if certification, which obtains second
Cryptographic Hash.
It is possible that when vehicle is sent, factory is repaired or depot is put in maintenance on record, if premise equipment is replaced, can be recognized
It is set to legal replacement, is not belonging to the case where replacing privately through private strength, at this point, the premise equipment after replacement belongs to legal make a reservation for
The identity information of premise equipment after replacement can be updated into server, be updated by Hash calculation by equipment, depot
The second cryptographic Hash and store as legal automobile finger-print.
S120: judging whether first cryptographic Hash and second cryptographic Hash are identical, obtains the first judging result.
S130: corresponding first control strategy is executed according to first judging result.
If the first judging result is that the first cryptographic Hash and the second cryptographic Hash be not identical, show legal premise equipment by privately
It distorts and does not put manufacturer on record, vehicle may include giving a warning, No starting, forbidding travelling, forbid any equipment operation of vehicle
Any of.
If the first judging result is that the first cryptographic Hash is identical as the second cryptographic Hash, show legal premise equipment not by privately
It distorts, then vehicle can operate normally.
It is executed and first judging result and institute specifically, this step may is that according to first judging result
State corresponding first control strategy of premise equipment.Specifically, if first judging result and the second judging result be not identical,
First control strategy is only to forbid the premise equipment to start or operation, rather than the vehicle arrangement of premise equipment is then still
It can run.Such as, if the first judging result is that the first cryptographic Hash and the second cryptographic Hash be not identical, and the premise equipment includes vehicle
Engine ECU but do not include interior air-conditioner controller, then can forbid engine start, but interior air-conditioning still can be beaten
It opens, if the first judging result is that the first cryptographic Hash and the second cryptographic Hash be not identical, and the premise equipment includes vehicle room lamp
Controller but do not include Engine ECU, then can forbid vehicle room lamp to open, but vehicle transmitter ECU still can be normal
Work.
Specifically, in this step specifically can also include: when first cryptographic Hash and second cryptographic Hash not phase
Whens equal, determine the premise equipment being tampered and corresponding control strategy is executed to the premise equipment being tampered.
When including multiple premise equipments, by the comparison of the first cryptographic Hash and the second cryptographic Hash, especially use body
Part information carries out the mode of predetermined way combination, can determine the premise equipment being tampered.Such as when premise equipment includes vehicle
Indoor lamp controller and Engine ECU, and what determination was tampered is Engine ECU, and vehicle room lamp controller is not usurped
Change, then only forbids Engine ECU to start or can sound an alarm instruction Engine ECU and be tampered, and vehicle room lamp controls
Device is still up.
Vehicle tamper resistant method provided by present embodiment can prevent the key equipment of vehicle to be tampered and influence vehicle
Safety, improve the safety of vehicle.
The vehicle tamper resistant method that second embodiment of the invention provides, as shown in Fig. 2, the method may include following steps
Suddenly.It should be understood that each concrete scheme suitable for first embodiment can correspondingly apply to the present embodiment, herein not
It is limited.
S200: the identity information of the premise equipment of the vehicle of collection is subjected to Hash calculation and obtains the first cryptographic Hash.
S210: being sent to server for first cryptographic Hash, to judge first cryptographic Hash by the server
Whether identical as the second cryptographic Hash for being stored in advance on the server, second cryptographic Hash is legal by the vehicle
The identity information of premise equipment carries out identical Hash calculation and obtains.
S220: corresponding first control strategy is executed according to the first judging result of the server feedback.
In the present embodiment, the first cryptographic Hash is sent to server, the first cryptographic Hash is compared by server
With the second cryptographic Hash, it is possible to reduce vehicle end program, and the safety of comparison can be improved.
The vehicle tamper resistant method that three embodiments of the invention provide, as shown in figure 3, the method may include following steps
Suddenly.It should be understood that this can be correspondingly applied to by being suitable for each concrete scheme of first embodiment and/or second embodiment
In embodiment, herein with no restrictions.
S300: the identity information of the premise equipment of the vehicle of collection is subjected to Hash calculation and obtains the first cryptographic Hash.
S310: receiving the second cryptographic Hash that server is sent, and second cryptographic Hash passes through the legal predetermined of the vehicle
The identity information of equipment carries out identical Hash calculation and obtains.
S320: judge whether first cryptographic Hash and second cryptographic Hash are identical, if not identical, then follow the steps
S330 thens follow the steps S340 if they are the same.
It should be understood that identical with second embodiment, judgment step can also be executed in server end.
S330: do not allow logon operation.
After this step, process terminates.
S340: allow logon operation.
S350: corresponding MD5 value is generated according to the software version information of the premise equipment.
After vehicle normally starts, software check process will be continued to complete, vehicle will be read in the software version in flash
Hold, the software can be system software, be also possible to be stored in the application software in flash.
Software version content can convert algorithm by the irreversible character string of MD5 algorithm, and it is unique to produce this
MD5 informative abstract, arbitrary software version content is after MD5 algorithm, and what is obtained is unique MD5 value, that is, if soft
Part version is changed (upgrading or replacement), then its corresponding MD5 value centainly changes correspondingly, if software version is identical, MD5 value
It is constant.
When with multiple premise equipments, it may include the software version information of multiple premise equipments, can be generated multiple
The software version of premise equipment MD5 verification and.
S360: it receives the corresponding with legal software version of server transmission and prestores MD5 value.
Prestoring MD5 value is that legal software version is calculated by MD5 algorithm, can be obtained and prestores before vehicle release
MD5 value, as legal MD5 value.
S370: judging the MD5 value and whether prestore MD5 value identical, and obtains the second judging result.
S380: corresponding second control strategy is executed according to second judging result.
(concrete scheme that is referred to the step S130 of first embodiment) similar with the step S130 of first embodiment,
It is specific it is possible that, when the second judging result, which is, is, show that software is not tampered with, then vehicle is mounted with the predetermined of the software
Equipment and/or the software can normally be started and run;When the second judging result is no, show that software is tampered, then vehicle
The premise equipment for being mounted with the software can not start or the software can not be installed and be run.
Present embodiment further includes software check step, when the premise equipment for determining vehicle is not passed this, it is thus necessary to determine that
Whether software is tampered, if software is also tampered, is equally also easy to cause safety accident, and therefore, the present embodiment passes through MD5
It is worth and prestores the comparison of MD5 value to determine whether software is tampered, is calculated software version content using MD5 algorithm, it will
Unique MD5 value is obtained, software is once be tampered, then MD5 value necessarily changes, and can safely monitoring software whether be usurped
Change, further increases the safety of vehicle.
The vehicle tamper resistant method that four embodiments of the invention provide, as shown in figure 4, the method may include following steps
Suddenly.It should be understood that each concrete scheme for being suitable for first embodiment and/or second embodiment and/or 3rd embodiment can
To correspondingly apply in the present embodiment, herein with no restrictions.
S400: the identity information of the premise equipment of the vehicle of collection is subjected to Hash calculation and obtains the first cryptographic Hash.
S410: receiving the second cryptographic Hash that server is sent, and second cryptographic Hash passes through the legal predetermined of the vehicle
The identity information of equipment carries out identical Hash calculation and obtains.
S420: judge whether first cryptographic Hash and second cryptographic Hash are identical, if not identical, then follow the steps
S430 thens follow the steps S440 if they are the same.
S430: do not allow logon operation.
S440: allow logon operation.
S450: corresponding MD5 value is generated according to the software version information of the premise equipment.
S460: being sent to the server for the MD5 value, with by the server judge the MD5 value and in advance
Be stored on the server whether corresponding with legal software version to prestore MD5 value identical.
S470: corresponding second control strategy is executed according to the second judging result of the server feedback.
The present embodiment is different from the third embodiment place and is, the MD5 value comparison of the present embodiment is carried out in server end
, it can so reduce the calculating of vehicle end.
Fig. 5 for the present invention provide vehicle 100 a kind of embodiment structure chart, the vehicle 100 may include processor 10,
Storage device 20 and vehicle tamper resistant device further include being stored in the storage device 20 and can be on the processor 10
Computer program of operation, such as application program installation procedure etc..Wherein, the processor 10 can be Vehicular intelligent gateway
And/or the control centre of domain controller, it is the core of Vehicular intelligent gateway and/or domain controller, the storage device 20
It similarly can be a part of Vehicular intelligent gateway and/or domain controller.
The processor 10 can be central processor equipment (CPU), can also be other general processors, at digital signal
It manages device (DSP), specific integrated circuit (ASIC), field programmable gate array (FPGA) or other programmable logic device, divide
Vertical door or transistor logic, discrete hardware components etc..General processor can be microprocessor or the processor
It can be any conventional processor etc..
The storage device 20 can be used for storing the computer program and/or module, and the processor 10 passes through operation
Or the computer program and/or module being stored in the storage device 20 are executed, and call and be stored in storage device 20
Data, realize the various functions of the vehicle.The storage device 20 can mainly include storing program area and storage data area,
Wherein, storing program area can application program needed for storage program area, at least one function etc.;Storage data area can store root
Created data etc. are used according to vehicle.It, can be in addition, storage device 20 may include high random access storage device
Including non-volatile memory device, such as hard disk, memory, plug-in type hard disk, intelligent memory card, safe digital card, flash card, extremely
A few disk storage device part, flush memory device or other non-volatile solid state memory parts.
Fig. 6 is the structural schematic diagram of the vehicle tamper resistant device 200 for the first embodiment that invention provides, and the vehicle is anti-to usurp
It may include the first computing module 21, the first receiving module 22, first judgment module 23 and the first execution module that repacking, which sets 200,
24。
The identity information of first computing module 21, the premise equipment for the vehicle that can be used for collect carries out Hash
The first cryptographic Hash is calculated.
First receiving module 22, can be used for receiving the second cryptographic Hash of server transmission, and second cryptographic Hash is logical
The identity information for crossing the legal premise equipment of the vehicle carries out identical Hash calculation and obtains.
The first judgment module 23 can be used for judging first cryptographic Hash and be stored in advance on the server
Whether the second cryptographic Hash is identical, obtains the first judging result.
First execution module 24 can be used for executing corresponding first control strategy according to first judging result.
Further, the vehicle includes at least two premise equipments, and first computing module 21 specifically can be used for:
Hash calculation is carried out after combining the identity information of at least two premise equipment according to predetermined way obtains the
One cryptographic Hash.
Further, the identity information includes: the device id of the premise equipment and the chip of the premise equipment
ID;
The mode of the predetermined way combination includes: to make a reservation for set using the device id and chip id combination as described
Standby total ID, and the input value by total ID combination of each premise equipment as Hash calculation in order.
Further, first execution module 24 is particularly used in, when first cryptographic Hash and second Hash
When being worth unequal, determines the premise equipment being tampered and corresponding control plan is executed to the premise equipment being tampered
Slightly.
Further, the vehicle tamper resistant device 200 can also include: the second computing module 25, the second receiving module
26, the second judgment module 27 and the second execution module 28.
First execution module 24 specifically can be also used for, and be executed accordingly described according to first judging result
After first control strategy, corresponding MD5 value is generated according to the software version information of the premise equipment.
Second computing module 25 can be used for receiving the prestoring corresponding with legal software version of the server transmission
MD5 value.
Second judgment module 27 can be used for judging the MD5 value and whether prestore MD5 value identical, and obtain second
Judging result.
Second execution module 28 can be used for executing corresponding second control strategy according to second judging result.
Fig. 7 is the structural schematic diagram of the vehicle tamper resistant device 300 for the second embodiment that invention provides, it should be understood that
It is that each concrete scheme of the vehicle tamper resistant device 200 suitable for first embodiment can also be suitable for the present embodiment accordingly
In.Corresponding with the vehicle tamper resistant method of above-described embodiment, in the present embodiment, the vehicle tamper resistant device 300 be can wrap
Include computing module 31, sending module 32 and execution module 33.
The identity information of the computing module 31, the premise equipment for the vehicle that can be used for collect carries out Hash calculation
Obtain the first cryptographic Hash;
The sending module 32 can be used for first cryptographic Hash being sent to server, to sentence by the server
Whether first cryptographic Hash of breaking and the second cryptographic Hash being stored in advance on the server are identical, and second cryptographic Hash is logical
The identity information for crossing the legal premise equipment of the vehicle carries out identical Hash calculation and obtains;
The execution module 33 can be used for executing corresponding first control according to the first judging result of the server feedback
System strategy.
The embodiment of the present invention also provides a kind of vehicle, and the vehicle includes processor and storage device, the storage device
It include processor-executable instruction, the executable instruction is used to execute when executed by the processor any of the above embodiment
The vehicle tamper resistant method.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all in essence of the invention
Made any modifications, equivalent replacements, and improvements etc. within mind and principle should all include within protection scope of the present invention.
Claims (10)
1. a kind of vehicle tamper resistant method, which is characterized in that the described method comprises the following steps:
The identity information of the premise equipment of the vehicle of collection is subjected to Hash calculation and obtains the first cryptographic Hash;
Receive the second cryptographic Hash that server is sent, the identity that second cryptographic Hash passes through the legal premise equipment of the vehicle
Information carries out identical Hash calculation and obtains;
Judge whether first cryptographic Hash and second cryptographic Hash being stored in advance on the server are identical, obtains the
One judging result;
Corresponding first control strategy is executed according to first judging result.
2. vehicle tamper resistant method according to claim 1, which is characterized in that described including at least two premise equipments
The identity information of the premise equipment of the vehicle of collection is subjected to Hash calculation and obtains the first cryptographic Hash, comprising:
Hash calculation is carried out after combining the identity information of at least two premise equipment according to predetermined way obtains the first Kazakhstan
Uncommon value.
3. vehicle tamper resistant method according to claim 2, it is characterised in that:
The identity information includes: the device id of the premise equipment and the chip id of the premise equipment;
The mode of the predetermined way combination includes: to be combined using the device id and the chip id as the premise equipment
Total ID, and the input value by total ID combination of each premise equipment as Hash calculation in order.
4. vehicle tamper resistant method according to claim 1, which is characterized in that described to be held according to first judging result
Corresponding first control strategy of row, comprising:
When first cryptographic Hash and second cryptographic Hash are unequal, the premise equipment that is tampered is determined and to being usurped
The premise equipment changed executes corresponding control strategy.
5. vehicle tamper resistant method according to claim 1, which is characterized in that described to be held according to first judging result
Corresponding first control strategy of row, comprising: when first judging result, which is, is, allow logon operation;
After corresponding first control strategy according to first judging result execution, the method also includes:
Corresponding MD5 value is generated according to the software version information of the premise equipment;
It receives the corresponding with legal software version of server transmission and prestores MD5 value;
Judge the MD5 value and whether prestore MD5 value identical, and obtains the second judging result;
Corresponding second control strategy is executed according to second judging result.
6. a kind of vehicle tamper resistant method, which is characterized in that the described method comprises the following steps:
The identity information of the premise equipment of the vehicle of collection is subjected to Hash calculation and obtains the first cryptographic Hash;
First cryptographic Hash is sent to server, to judge first cryptographic Hash by the server and be stored in advance
Whether the second cryptographic Hash on the server is identical, and second cryptographic Hash passes through the legal premise equipment of the vehicle
Identity information carries out identical Hash calculation and obtains;
Corresponding first control strategy is executed according to the first judging result of the server feedback.
7. vehicle tamper resistant method according to claim 6, which is characterized in that described according to the of the server feedback
One judging result executes corresponding first control strategy, comprising: when the first judging result of the server feedback, which is, is, permits
Perhaps logon operation;
After corresponding first control strategy according to first judging result execution, the method also includes:
Corresponding MD5 value is generated according to the software version information of the premise equipment;
The MD5 value is sent to the server, to judge the MD5 value by the server and be stored in advance in described
On server whether prestore MD5 value identical;
Corresponding second control strategy is executed according to the second judging result of the server feedback.
8. a kind of vehicle tamper resistant device, which is characterized in that described device includes:
Computing module obtains the first Hash for the identity information of the premise equipment for the vehicle collected to be carried out Hash calculation
Value;
Receiving module, for receiving the second cryptographic Hash of server transmission, second cryptographic Hash is legal by the vehicle
The identity information of premise equipment carries out identical Hash calculation and obtains;
Judgment module, for judge first cryptographic Hash and the second cryptographic Hash for being stored in advance on the server whether phase
Together, the first judging result is obtained;
Execution module, for executing corresponding first control strategy according to first judging result.
9. a kind of vehicle tamper resistant device, which is characterized in that described device includes:
Computing module obtains the first Hash for the identity information of the premise equipment for the vehicle collected to be carried out Hash calculation
Value;
Sending module, for first cryptographic Hash to be sent to server, to judge that described first breathes out by the server
Whether uncommon value and the second cryptographic Hash being stored in advance on the server are identical, and second cryptographic Hash passes through the vehicle
The identity information of legal premise equipment carries out identical Hash calculation and obtains;
Execution module, for executing corresponding first control strategy according to the first judging result of the server feedback.
10. a kind of vehicle, which is characterized in that the vehicle includes:
Processor;And
Storage device, the storage device include processor-executable instruction, and the executable instruction is when executed by the processor
The described in any item vehicle tamper resistant methods of 1-7 are required for perform claim.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910729772.1A CN110371081A (en) | 2019-08-08 | 2019-08-08 | Vehicle tamper resistant method, device and vehicle |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910729772.1A CN110371081A (en) | 2019-08-08 | 2019-08-08 | Vehicle tamper resistant method, device and vehicle |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110371081A true CN110371081A (en) | 2019-10-25 |
Family
ID=68258536
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910729772.1A Pending CN110371081A (en) | 2019-08-08 | 2019-08-08 | Vehicle tamper resistant method, device and vehicle |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110371081A (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111193706A (en) * | 2019-11-25 | 2020-05-22 | 泰康保险集团股份有限公司 | Identity verification method and device |
CN112994898A (en) * | 2021-04-08 | 2021-06-18 | 北京邮电大学 | Vehicle intranet communication safety authentication method and device |
CN113709103A (en) * | 2021-07-19 | 2021-11-26 | 英博超算(南京)科技有限公司 | Automobile ECU gateway fingerprint VFP decryption system and method |
CN113709102A (en) * | 2021-07-19 | 2021-11-26 | 英博超算(南京)科技有限公司 | Gateway ECU security service system based on PKI asymmetric mechanism |
CN113709101A (en) * | 2021-07-19 | 2021-11-26 | 英博超算(南京)科技有限公司 | Automobile fingerprint safety identification system and method |
CN113708922A (en) * | 2021-07-19 | 2021-11-26 | 英博超算(南京)科技有限公司 | Safe updating method for automobile fingerprint VFP |
CN114257450A (en) * | 2021-12-21 | 2022-03-29 | 山东爱德邦智能科技有限公司 | Method, device and medium for preventing parts from being tampered |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6069410A (en) * | 1994-09-30 | 2000-05-30 | Sgs-Thomson Microelectronics S.R.L. | Anti-tampering method and corresponding circuits and electric systems |
CN107545181A (en) * | 2017-08-16 | 2018-01-05 | 上海策赢网络科技有限公司 | Program operating method, terminal and computer-readable recording medium |
CN108366115A (en) * | 2018-02-08 | 2018-08-03 | 深圳市轱辘车联数据技术有限公司 | A kind of vehicle OBD connectors management method, system and relevant apparatus |
CN109492378A (en) * | 2018-11-26 | 2019-03-19 | 平安科技(深圳)有限公司 | A kind of auth method based on EIC equipment identification code, server and medium |
CN109976770A (en) * | 2019-03-22 | 2019-07-05 | 深圳市元征科技股份有限公司 | A kind of ECU writes with a brush dipped in Chinese ink method, system and relevant device |
-
2019
- 2019-08-08 CN CN201910729772.1A patent/CN110371081A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6069410A (en) * | 1994-09-30 | 2000-05-30 | Sgs-Thomson Microelectronics S.R.L. | Anti-tampering method and corresponding circuits and electric systems |
CN107545181A (en) * | 2017-08-16 | 2018-01-05 | 上海策赢网络科技有限公司 | Program operating method, terminal and computer-readable recording medium |
CN108366115A (en) * | 2018-02-08 | 2018-08-03 | 深圳市轱辘车联数据技术有限公司 | A kind of vehicle OBD connectors management method, system and relevant apparatus |
CN109492378A (en) * | 2018-11-26 | 2019-03-19 | 平安科技(深圳)有限公司 | A kind of auth method based on EIC equipment identification code, server and medium |
CN109976770A (en) * | 2019-03-22 | 2019-07-05 | 深圳市元征科技股份有限公司 | A kind of ECU writes with a brush dipped in Chinese ink method, system and relevant device |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111193706A (en) * | 2019-11-25 | 2020-05-22 | 泰康保险集团股份有限公司 | Identity verification method and device |
CN111193706B (en) * | 2019-11-25 | 2022-03-15 | 泰康保险集团股份有限公司 | Identity verification method and device |
CN112994898A (en) * | 2021-04-08 | 2021-06-18 | 北京邮电大学 | Vehicle intranet communication safety authentication method and device |
CN112994898B (en) * | 2021-04-08 | 2022-07-26 | 北京邮电大学 | Vehicle intranet communication safety authentication method and device |
CN113709103A (en) * | 2021-07-19 | 2021-11-26 | 英博超算(南京)科技有限公司 | Automobile ECU gateway fingerprint VFP decryption system and method |
CN113709102A (en) * | 2021-07-19 | 2021-11-26 | 英博超算(南京)科技有限公司 | Gateway ECU security service system based on PKI asymmetric mechanism |
CN113709101A (en) * | 2021-07-19 | 2021-11-26 | 英博超算(南京)科技有限公司 | Automobile fingerprint safety identification system and method |
CN113708922A (en) * | 2021-07-19 | 2021-11-26 | 英博超算(南京)科技有限公司 | Safe updating method for automobile fingerprint VFP |
CN113708922B (en) * | 2021-07-19 | 2023-09-12 | 英博超算(南京)科技有限公司 | Safety updating method for automobile fingerprint VFP |
CN114257450A (en) * | 2021-12-21 | 2022-03-29 | 山东爱德邦智能科技有限公司 | Method, device and medium for preventing parts from being tampered |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110371081A (en) | Vehicle tamper resistant method, device and vehicle | |
CN108762783B (en) | Software updating method and device for vehicle system and vehicle system | |
CN111835689B (en) | Identity authentication method of digital key, terminal device and medium | |
CN108958787B (en) | Block chain system upgrading method, device, equipment and storage medium | |
US20070118752A1 (en) | Authentication of control units in a vehicle | |
JP6009622B1 (en) | Update manager and in-vehicle software update system using the same | |
US9767264B2 (en) | Apparatus, method for controlling apparatus, and program | |
CN113645590B (en) | Method, device, equipment and medium for remotely controlling vehicle based on encryption algorithm | |
CN111404993B (en) | Digital key sharing method, device and equipment | |
US20070067635A1 (en) | Authentication of a vehicle-external device | |
CN108123805A (en) | Communication security authentication method between vehicle-mounted ECU | |
CN108482308B (en) | Electric vehicle safety control method and device, storage medium and electric vehicle | |
CN111051159B (en) | Control system for vehicle | |
US20210061223A1 (en) | Vehicle operation device, vehicle operation method, and non-transitory storage medium storing vehicle operation program | |
CN112148312A (en) | Firmware upgrading management method, device, equipment and medium for electronic controller | |
CN110400393A (en) | A kind of method and system of long-range control door contact interrupter | |
US20220377068A1 (en) | Vehicle control device, vehicle, vehicle control method, and non-transitory recording medium | |
US10789365B2 (en) | Control device and control method | |
CN109802929A (en) | Client-side program upgrade method and computer readable storage medium based on dual system | |
CN110116705B (en) | Vehicle checking method and device and vehicle | |
CN113411311A (en) | ECU (electronic control Unit) diagnosis authorization verification method, storage medium and system | |
JP4811132B2 (en) | Vehicle antitheft device | |
US20240070258A1 (en) | User-customized vehicle control using serverless functions | |
JP7400680B2 (en) | Authentication management method, authentication management program, and user authentication management device | |
KR102411797B1 (en) | Hardware-based vehicle cyber security system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20191025 |